Now we know the components of the AD RMS and its capabilities. In this section, we are going to understand in detail how all these components work together to protect corporate data.
Before we start the data protecting process, we need to have a healthy AD RMS cluster, AD RMS clients (author and recipient), and a reliable connection between those components. Once these prerequisites are fulfilled, the data protection process will happen in three main stages: protect content by the author, publish the protected content, and access the protected content by the recipient.
Let's assume Peter is trying to protect a document using AD RMS. He is going to send it to Adam and he does not want him to edit or print it. This is the first time he is going to use AD RMS. In an AD RMS environment, the user Peter will be referred to as an information author. In his...